Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle D Bellizia, O Bronchain, G Cassiers, V Grosso, C Guo, C Momin, ... Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 85 | 2020 |
Spook: Sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ... IACR Transactions on Symmetric Cryptology 2020 (S1), 295--349, 2020 | 81 | 2020 |
Leakage certification revisited: Bounding model errors in side-channel security evaluations O Bronchain, JM Hendrickx, C Massart, A Olshevsky, FX Standaert Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 72 | 2019 |
Side-channel countermeasures’ dissection and the limits of closed source security evaluations O Bronchain, FX Standaert IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-25, 2020 | 52 | 2020 |
Bitslicing arithmetic/Boolean masking conversions for fun and profit: with application to lattice-based KEMs O Bronchain, G Cassiers IACR Transactions on Cryptographic Hardware and Embedded Systems, 553-588, 2022 | 47 | 2022 |
Breaking masked implementations with many shares on 32-bit software platforms: or when the security order does not matter O Bronchain, FX Standaert IACR Transactions on Cryptographic Hardware and Embedded Systems, 202-234, 2021 | 47 | 2021 |
Modeling soft analytical side-channel attacks from a coding theory viewpoint Q Guo, V Grosso, FX Standaert, O Bronchain IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020 | 33 | 2020 |
Protecting dilithium against leakage: Revisited sensitivity analysis and improved implementations M Azouaoui, O Bronchain, G Cassiers, C Hoffmann, Y Kuzovkova, ... Cryptology ePrint Archive, 2022 | 31 | 2022 |
Systematic study of decryption and re-encryption leakage: the case of kyber M Azouaoui, O Bronchain, C Hoffmann, Y Kuzovkova, T Schneider, ... International Workshop on Constructive Side-Channel Analysis and Secure …, 2022 | 25 | 2022 |
Multi-tuple leakage detection and the dependent signal issue O Bronchain, T Schneider, FX Standaert IACR Transactions on Cryptographic Hardware and Embedded Systems, 318-345, 2019 | 24 | 2019 |
Improved leakage-resistant authenticated encryption based on hardware AES coprocessors O Bronchain, C Momin, T Peters, FX Standaert IACR Transactions on Cryptographic Hardware and Embedded Systems, 641-676, 2021 | 19 | 2021 |
Give me 5 minutes: Attacking ASCAD with a single side-channel trace O Bronchain, G Cassiers, FX Standaert Cryptology ePrint Archive, 2021 | 18 | 2021 |
Leveling Dilithium against Leakage: Revisited Sensitivity Analysis and Improved Implementations. M Azouaoui, O Bronchain, G Cassiers, C Hoffmann, Y Kuzovkova, ... IACR Cryptol. ePrint Arch. 2022, 1406, 2022 | 16 | 2022 |
Security analysis of deterministic re-keying with masking and shuffling: application to ISAP B Udvarhelyi, O Bronchain, FX Standaert Constructive Side-Channel Analysis and Secure Design: 12th International …, 2021 | 15 | 2021 |
Bitslice masking and improved shuffling: How and when to mix them in software? M Azouaoui, O Bronchain, V Grosso, K Papagiannopoulos, FX Standaert IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022 | 14 | 2022 |
Efficient profiled side-channel analysis of masked implementations, extended O Bronchain, F Durvaux, L Masure, FX Standaert IEEE Transactions on Information Forensics and Security 17, 574-584, 2022 | 13 | 2022 |
Spook: sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher (2019) D Bellizia, F Berti, O Bronchain, G Cassiers, S Duval, C Guo, G Leander, ... | 9 | |
Scalib: a side-channel analysis library G Cassiers, O Bronchain Journal of Open Source Software 8 (86), 5196, 2023 | 8 | 2023 |
From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium M ElGhamrawy, M Azouaoui, O Bronchain, J Renes, T Schneider, ... IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (4 …, 2023 | 7 | 2023 |
How to fool a black box machine learning based side-channel security evaluation CH Bertrand Van Ouytsel, O Bronchain, G Cassiers, FX Standaert Cryptography and Communications 13 (4), 573-585, 2021 | 7* | 2021 |